Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3272036.3272039acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Optimized Anonymity Updating in VANET Based on Information and Privacy Joint Metrics

Published: 25 October 2018 Publication History

Abstract

With the continuous development of the vehicular ad hoc network (VANET), many challenges related to network security have come one after another, among which privacy issues are particularly prominent. To help each network user decide when and where to protect their privacy, we suggest creating a user-centric privacy computing system in VANET. A risk assessment function and a set of decision weights are proposed to simulate the driver's decision-making intent in the vehicle network. Besides, proposed information and privacy joint metrics are used as the key indicators for dynamic selection of Mix-zone. Finally, by considering three influencing factors: maximum road capacity, user-centric quantitative privacy and attacker information measurement, defined mixzone creation mechanism to achieve privacy protection in VANET.

References

[1]
A Acquisti, L Brandimarte, and G Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509--514.
[2]
Icek Ajzen. 1991. The theory of planned behavior. Organizational behavior and human decision processes 50, 2 (1991), 179--211.
[3]
Qasim Ali Arain, Zhongliang Deng, Imran Memon, Salman Arain, Faisal Kareem Shaikh, Asma Zubedi, Mukhtiar Ali Unar, Aisha Ashraf, and Roshan Shaikh. 2017. Privacy Preserving Dynamic Pseudonym- Based Multiple Mix-Zones Authentication Protocol over Road Networks. Wireless Personal Communications An International Journal 95, 2 (2017), 505--521.
[4]
A. R Beresford and F Stajano. 2004. Mix zones: user privacy in locationaware services. (2004), 127.
[5]
T.W. Chim, S. M. Yiu, Lucas C. K. Hui, and Victor O. K. Li. 2014. VSPN: VANET-Based Secure and Privacy-Preserving Navigation. IEEE Trans. Comput. 63, 2 (2014), 510--524.
[6]
J. M De Fuentes. 2010. Overview of security issues in Vehicular ad-hoc networks,. Handbook of Reseach on Mobility and Computing (2010).
[7]
Dok Hang, Huirong Fu, Ruben Echevarria, and Hesiri Weerasinghe. 2010. Privacy Issues of Vehicular Ad-Hoc Networks. International Journal of Future Generation Communication & Networking 3 (2010).
[8]
Leping Huang, Hiroshi Yamane, Kanta Matsuura, and Kaoru Sezaki. 2005. Towards Modeling Wireless Location Privacy. Springer Berlin Heidelberg. 59--77 pages.
[9]
D Kahneman and A Tversky. 1979. Prospect Theory: Analysis of Decision under Risk. Econometrica 47, 2 (1979), 263--291.
[10]
Jie Li, Huang Lu, and Mohsen Guizani. 2015. ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs. IEEE Transactions on Parallel & Distributed Systems 26, 4 (2015), 938--948.
[11]
Mingyan Li, Krishna Sampigethaya, Leping Huang, and Radha Poovendran. 2006. Swing & swap:user-centric approaches towards maximizing location privacy. In ACM Workshop on Privacy in Electronic Society. 19--28.
[12]
Imran Memon, Ling Chen, Qasim Ali Arain, Hina Memon, and Gencai Chen. 2018. Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. International Journal of Communication Systems 31, 1 (2018).
[13]
C. E. Shannon. 1938. A Mathematical Theory of Communication: The Bell System Technical Journal. Journal of the Franklin Institute 196, 4 (1938), 519--520.
[14]
Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang. 2010. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. IEEE Transactions on Parallel & Distributed Systems 21, 9 (2010), 1227--1239.
[15]
Theodorakopoulos and Georgios. 2011. Quantifying location privacy. IEEE Symposium on Security & Privacy 42, 12 (2011), 247--262.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DIVANet'18: Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications
October 2018
93 pages
ISBN:9781450359641
DOI:10.1145/3272036
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity updating
  2. privacy awareness
  3. security
  4. vehicular network

Qualifiers

  • Research-article

Funding Sources

  • National Key Research and Development Program of China

Conference

MSWIM '18
Sponsor:

Acceptance Rates

Overall Acceptance Rate 70 of 308 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 107
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media